Which two traffic types trigger pass-through firewall user a

题目
多选题
Which two traffic types trigger pass-through firewall user authentication?()
A

SSH

B

Telnet

C

ICMP

D

OSPF

E

HTTP

参考答案和解析
正确答案: A,E
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

A. ICMP

B. SNMP

C. TCP

D. HTTPS


参考答案:A, C

第2题:

Which of the following traffic types would a network layer firewall be unable to filter?()

A.SMTP traffic

B.ICMP messages

C.HTTP traffic

D.Email sender verification


参考答案:D

第3题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

A. ping

B. FTP

C. Telnet

D. HTTP

E. HTTPS


参考答案:B, C, D

第4题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第5题:

Which two statements are correct about firewall filters in the Junos OS?()

  • A、Firewall filters are stateless.
  • B、Firewall filters are used to control routing information that is exchanged between devices.
  • C、Firewall filters are used to control traffic passing through the device.
  • D、Firewall filters can only be applied to traffic entering the device.

正确答案:A,C

第6题:

A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()

A. inbound traffic transiting the router

B. outbound traffic transiting the router

C. traffic destined to the Routing Engine

D. traffic destined to the interface address on which the filter is applied


参考答案:A, C, D

第7题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第8题:

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A. Resource access policy on the MAG Series device

B. IPsec routing policy on the MAG Series device

C. General traffic policy blocking access through the firewall enforcer

D. Auth table entry on the firewall enforcer


参考答案:A, D

第9题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

  • A、ping
  • B、FTP
  • C、Telnet
  • D、HTTP
  • E、HTTPS

正确答案:B,C,D

第10题:

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

  • A、ICMP
  • B、SNMP
  • C、TCP
  • D、HTTPS

正确答案:A,C

更多相关问题